CIOAdvisor Apac

  • Home
  • Conference
  • Newsletter
  • Whitepapers
  • News
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Application Security Testing
      • Artificial Intelligence
      • Augmented and Virtual Reality
      • Backup and Storage
      • Blockchain
      • Cloud
      • Contact Center
      • Data Analytics
      • Digital Marketing
      • E-Invoicing
      • Ecommerce
      • Emerging Technology
      • Enterprise Mobility
      • GIS
      • Govt Tech
      • Human Capital Management
      • Human Resource
      • IoT
      • ISP
      • IT Service Management
      • Leadership Development
      • LMS
      • Logistics
      • Machine Learning
      • Machine Vision
      • Managed Print Services
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • Risk Management
      • Robotics
      • RPA
      • SDN
      • Staffing and Recruitment Services
      • Telecom
  • Cloud
  • Contact Center
  • GIS
  • ISP
  • Logistics
  • Machine Vision
  • E-Invoicing
Specials
  • Specials

  • Application Security Testing
  • Artificial Intelligence
  • Augmented and Virtual Reality
  • Backup and Storage
  • Blockchain
  • Cloud
  • Contact Center
  • Data Analytics
  • Digital Marketing
  • E-Invoicing
  • Ecommerce
  • Emerging Technology
  • Enterprise Mobility
  • GIS
  • Govt Tech
  • Human Capital Management
  • Human Resource
  • IoT
  • ISP
  • IT Service Management
  • Leadership Development
  • LMS
  • Logistics
  • Machine Learning
  • Machine Vision
  • Managed Print Services
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • Risk Management
  • Robotics
  • RPA
  • SDN
  • Staffing and Recruitment Services
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • Mobile Application
Editor's Pick (1 - 4 of 8)
left
Mobile Technology enriching Digital Travel Experience

Michael Kubasik, Executive Vice President & CIO, Travel and Transport, Inc.

Technology Keys to Building a Disruptive Networked Business

Robert Crudup, EVP & CIO, SEI Investment Company

Evolution of Technology in the Wealth Management Space

Uday Shankar, CIO, BNY Mellon Wealth Management

How Mobile Apps Benefit Businesses

Tejas Vyas, Head of Product & Design, bigbasket.com

Feature Flags the Hidden Gem to Agility

Srinivasan Nanduri, Architect, Mobile Development, IBM Cloud

Enterprise Application Strategy (Build, Buy, Rent, Acquire, Co-create)

Digant Singh, VP, Compliance Technology, Barclays

A Call for Innovation: How 5G and the Mega Cloud are Going to Transform Infrastructure and Operations

David Webster, President, APJ Enterprise & Customer Operations, Dell EMC

How Mobile Technology help Real Estate industries

Chitranjan Kesari, Head of Information Technology Department, Kanakia Group

right

THANK YOU FOR SUBSCRIBING

Mobile Threats: Is Your Mobile Device a New 'Trojan Horse' in Disguise?

By Sanjay Rohatgi, Senior Vice President, Asia Pacific, Symantec

Tweet
content-image

Sanjay Rohatgi, Senior Vice President, Asia Pacific, Symantec

Working in a digital era, there is really no escaping from the Bring Your Own Device (BYOD) trend as more and more organizations are building out a mobile and agile workforce. As business leaders empower their workforce to stay nimble and react quickly, it is also important to pause and check that they are not putting themselves at risk or in a vulnerable position.

Threats in the mobile space are continuing to evolve, mature and grow year-on-year. Symantec’s Internet Security Threat Report Volume 23 reported a 54 percent increase in new mobile malware variants in 2017, with an average of 23,795 malicious mobile applications blocked on mobile devices each day. For organizations, what this means is that their IT teams have to aggressively defend against more varied threats on top of the growing volume.

With consumerization of IT and BYOD blurring the lines between corporate and personal, the adoption of mobile devices in the workplace is becoming more pervasive than ever, and potentially, the new ‘trojan horse’ we are embedding in our environment. Obtaining leaked sensitive information aside, cyber criminals have also come up with innovative ways to profit and generate revenue from these mobile devices. Ransomware on mobile phones for example, locks devices or encrypts data, forcing victims and organizations to pay a ransom in return for access.
Back to basics with cyber awareness and good security hygiene

Education is the first step for all organizations looking to strengthen their cyber security posture. By keeping abreast of security risks and trends, employees will know what they should watch out for and organizations can take proactive steps to ensure that their security response is effective.

Every organization’s needs are different whether it is protecting email and network access, cloud access control or even customer business apps. However, they all share a common goal in protecting and controlling access to sensitive business data, while continuing to give employees the flexibility required to be productive. There is no silver bullet to cyber security but mobile security technology can help predict, detect, and protect against physical, malware, network, and vulnerability exploits.

Diving deeper into mobile security, there is no avoiding user behavior as one of the major factors in securing corporate data. With employees in the front lines of information security, and often the most vulnerable to attacks, good cyber hygiene has to be nurtured in the workplace.

Encouraging employees to think proactively about their cyber security behaviors will fortify an organization’s cyber security front. This will also significantly reduce human errors – a weakness that cyber criminals are known to exploit.

Here are some cyber hygiene tips that employees can easily adopt:

• Changing your passwords: Passwords are the simplest form of protection and often the first defense against intrusion. Use strong and unique passwords for mobile, computers, other IoT devices and Wi-Fi networks. Do not use common or easily guessable passwords such as “123456” or “password”.

• Make sure you have the latest mobile OS version, and all software is up-to-date: Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by attackers.

•Be extra careful with links from unknown sources: Malicious popups and websites can be increasingly authentic-looking as cyber attackers become more sophisticated. To avoid falling for such traps, do not click on anything that you do not trust.

• Avoid granting excessive permissions: Read the permissions required before installing an app and ask yourself if they are simply there to acquire data about you. If it is impossible to determine where your data will go and what they will use it for, it might be best to avoid installing the app.
tag

cyber criminals

BYOD

IoT

Read Also

How Mobile Apps Benefit Businesses

How Mobile Apps Benefit Businesses

Feature Flags the Hidden Gem to Agility

Feature Flags the Hidden Gem to Agility

Enterprise Application Strategy (Build, Buy, Rent, Acquire, Co-create)

Enterprise Application Strategy (Build, Buy, Rent, Acquire, Co-create)

A Call for Innovation: How 5G and the Mega Cloud are Going to Transform Infrastructure and Operations

A Call for Innovation: How 5G and the Mega Cloud are Going to Transform Infrastructure and Operations

Weekly Brief

loading
ON THE DECK

Mobile Application 2019

Top Vendors

TECH News

  • How E-invoicing will turn India's Economy into a Digital?
    How E-invoicing will turn India's...
  • How Data Privacy will Mould the Future of Organizations?
    How Data Privacy will Mould the...
  • Here's How Machine Learning Benefit Industries
    Here's How Machine Learning Benefit...
  • How GIS and the Cloud Work in Convergence?
    How GIS and the Cloud Work in...
View More ›

Copyright © 2019 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://mobile-application.cioadvisorapac.com/cxoinsights/mobile-threats-is-your-mobile-device-a-new-trojan-horse-in-disguise-nwid-1421.html